Re: Intercepting unlink system cal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2005-06-03 at 09:21 +0530, Dipti Pawar wrote:
> Hi
> 
>  
> 
> Thanks a lot Gaurav and Robert Bennett.
> 
> At least the code is working now after I did the corrections told by
> you.
> 
> But one more thing I did is that I subtracted 1 from __NR_unlink that
> is index for accessing system call table. 
> 
> __NR_unlink is defined in “unistd.h”.I think there is difference
> between starting index of system call table and indexes defined in
> “unistd.h “.


I assume you're only doing this for debugging purposes btw and not for
any production or shipping code...  intercepting syscalls is considered
rather evil in general (and besides it can't be done in binary modules
without major legal issues)


--
Kernelnewbies: Help each other learn about the Linux kernel.
Archive:       http://mail.nl.linux.org/kernelnewbies/
FAQ:           http://kernelnewbies.org/faq/


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux